Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Practical Guide to Simplify Your Malware Sandboxes Configuration

admin by admin
Apr 8, 2024
in News
A A
0

Malware sandboxes are integral to security applications like intrusion detection, forensics, and threat intelligence, but using them correctly is challenging due to choices in implementations, monitoring techniques, and configurations. 

Improper use can negatively impact applications through false positives, inconclusive analyses, and poor threat data.

Prior works survey dynamic analysis methods for building and improving sandboxes, evasion techniques, or experiment design but lack depth in understanding and configuring sandbox deployments for new applications. 

This complexity dominates non-expert users across disciplines. The paper bridges this gap by studying over 350 papers across 20 years to systematize 84 representative works on using sandboxes. 

It proposes a component framework simplifying deployments/configurations for detection, observational studies, and anti-analysis applications.

Guidelines are derived by the following security researchers from the Georgia Institute of Technology applying this framework to systematize prior works, helping users effectively incorporate sandboxes while avoiding pitfalls, unlike previous generalized surveys:-

  • Omar Alrawi
  • Miuyin Yong Wong
  • Athanasios Avgetidis
  • Kevin Valakuzhy
  • Boladji Vinny Adjibi
  • Konstantinos Karakatsanis
  • Mustaque Ahamad
  • Doug Blough
  • Fabian Monrose
  • Manos Antonakaki

Malware Sandbox Configuration

It appears that generic sandboxes are especially limited to famous malware families, while modern approaches do not always guarantee expected results.

Document

Integrate ANY.RUN in Your Company for Effective Malware Analysis

Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

  • Real-time Detection
  • Interactive Malware Analysis
  • Easy to Learn by New Security Team members
  • Get detailed reports with maximum data
  • Set Up Virtual Machine in Linux & all Windows OS Versions
  • Interact with Malware Safely

If you want to test all these features now with completely free access to the sandbox:


Technically, it is worth noting that transparent monitoring commitment is closely related to this technique.

Besides this, the configured environments supported with user artifacts can be employed to improve research outcomes. 

It would be important to mark the analysis space and threat model and understand how artifacts affect an application’s functioning.

Seven recommendations are given to enhance sandboxing based on block-listing, behavior extraction, and family classification from three experiments involving 1,471 malware samples.

Overview of the systematization framework and stakeholders relationship (Source – Arxiv)

The researchers made sense of the sandbox literature by studying over 300 papers from the best security conferences in a period of 20 years. 

They found relevant works by keyword searching for dynamic malware sandbox analysis, manually tracking citation chains, and iteratively developing the set of search terms.

Here below, we have mentioned all the methodologies:-

  • Malware Code Execution Order
  • Quantifying Malware Execution
  • Identifying Malware Families

The experiments prove that guided sandbox artifacts improve classification accuracy compared to unguided methods. 

However, there is no single solution is available when it comes to configuring the sandbox which underscores the importance of defining analysis scope, threat modeling, and admitting sandbox limitations.

Secure your emails in a heartbeat! Take Trustifi free 30-second assessment and get matched with your ideal email security vendor - Try Here

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.